SlideShare a Scribd company logo
1 of 7
Issues in Information Systems
Volume XII, No. 2, pp. 67-73-, 2011
Information Technology Ethics: A Research Framework
Issues in Information Systems
Volume X, Issue X, pp. x-x, Year
INFORMATION TECHNOLOGY ETHICS: A RESEARCH
FRAMEWORK
Richard V. McCarthy, Quinnipiac University, [email protected]
Leila Halawi, Nova Southeastern University, [email protected]
Jay E. Aronson, The University of Georgia, [email protected]
ABSTRACT
Information technology has become so pervasive that
opportunities for abuses abound. IT Ethics has taken on
increasing importance as the size and complexity of IT issues
continues to grow. This paper outlines a research framework to
analyze: Do significant ethical differences exist amongst
undergraduate and graduate MIS students?
Keywords: Information Technology (IT), Ethics, IT and Ethics
INTRODUCTION
We live in an information society. Most people live and work
within the context of information technology (Abratt, Nel, &
Higgs, 1992). IT enhances leisure time and enriches culture by
expanding the distribution of information, relieves pressures on
urban areas by enabling individuals to work from home or
remote-site offices (Garcia, 2009), changes the way we work,
and the way we work with one another. In terms of productivity
and speed of communications, these changes have been mostly
positive (Benham, 1995). But what have been the costs? IT
introduces change that creates new ethical issues.
Ethical Theories and IT
Gates (1995) suggested that the study of computer ethics is
needed because there is a vacuum of policies surrounding the
new possibilities. He defines computer ethics as the analysis of
the nature and social impact of computer technology and the
corresponding formulation and justification of policies for the
ethical use of such a technology.
RESEARCH METHODOLOGY
Our research centered upon the following research question: Do
significant ethical differences exist amongst undergraduate and
graduate MIS students in the United States?
The research hypotheses to be tested are as follows:
H1: Computer information systems undergraduate and graduate
students have the same ethical beliefs
H2: Female computer information systems students and male
computer information systems students have the
same ethical beliefs.
To test these hypotheses a subset of five ethical scenarios that
were utilized by Athey (2011) to test if significant ethical
differences existed amongst manager was used along with one
ethical scenario that was developed based upon an actual case
from the researcher’s university. According to Jones (2014),
“the scenario technique has been shown to be useful in eliciting
attitudes by personalizing the issues” (p. 15).
RESULTS
Eighty-seven scenarios were administered and the demographics
of the sample population are shown in Table 1. The sample
population had more males (70.1%) than females (29.9%).
A Chi-Square test was performed to test each of the three
hypotheses. The first hypothesis tested whether undergraduate
and graduate computer information systems students hold the
same ethical beliefs. Responses from MBA students were not
considered as part of this analysis. A p-value was calculated
for each of the six scenarios
and any value less than .05 was rejected. Scenarios 2 and 6 were
rejected on this basis, but scenarios 1, 3, 4, and 5 were
accepted.
Table 1. Demographics
Gender
Program
Responses
Female
Undergraduate CIS student
4
Graduate CIS student
6
Graduate MBA student
16
Male
Undergraduate CIS student
27
Graduate CIS student
19
Graduate MBA student
15
The second hypothesis tested whether female and male
computer information systems students hold the same ethical
beliefs. Responses from MBA students were not considered as
part of this analysis. A p-value was calculated for each of the
six scenarios and any value less than .05 was rejected.
Scenarios 1, 2, 3 and 6 were rejected on this basis, but scenarios
4 and 5 were accepted.
Figure 1. Technology Adoption Life Cycle
The third hypothesis tested whether computer information
systems graduate students and masters of business
administration graduate students hold the same ethical beliefs.
Responses from undergraduate students were not considered as
part of this analysis. A p-value was calculated for each of the
six scenarios and none of the scenarios exhibited a value less
than .05.
SUMMARY
It was very clear from the responses that there were no
significant differences in ethical beliefs amongst MBA and MS-
CIS graduate students. It should be noted that in both cases the
students had not received formal training related to computer
ethics within there program of study, though in both cases the
topic was covered in sections within their curriculum. The
curriculum for the MBA students is changing next year to
include a formal course in business ethics that will include
information technology related topics.
Based upon the results of our study, we concluded that
significant differences existed between male and female
computer information systems students in their ethical beliefs.
Though as noted previously, there was a small sample
population of female students. This is significant because it
supports the industry study gender differences that show that
software piracy and hacking tend to be more prevalent amongst
males than females.
REFERENCES
Abratt, R., Nel D., & Higgs, S. N. (1992). An examination of
the ethical beliefs of managers using selected scenarios in a
cross-cultural environment. Journal of Business Ethics, 11(1),
29-35.
Benham, H. C., & Wagner, J. L. (1995). Ethical attitudes of
business students and MIS personnel. Proceedings of the ACM
SIGCPR Conference [online], Nashville TN USA, 44-49.
Available:
www.acm.org/pubs/articles/proceedings/cpr/212490/p44-
wagner/p44-wagner.pdf
Gates, B. (1995). The road ahead. New York, NY: Viking
Penguin Group.
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
Eager
Beavers
Early
Adopters
Early
Majority
Late Majority
Technically
Adverse
Percentage
Traditional TALC
Surveyed Individuals
Surveyed Organizations

More Related Content

Similar to Issues in Information SystemsVolume XII, No. 2, pp. 67-73-.docx

2008 Annual Review Presentation
2008 Annual Review Presentation2008 Annual Review Presentation
2008 Annual Review PresentationBang Dinh
 
Identifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysisIdentifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysisGabriela Grosseck
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Sciencejournal ijrtem
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...ijcsit
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...AIRCC Publishing Corporation
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremhaifa rzem
 
Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...Jennifer McCauley
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxtodd241
 
1 An Introduction to Data Ethics MODULE AUTHOR1 S
1 An Introduction to Data Ethics MODULE AUTHOR1   S1 An Introduction to Data Ethics MODULE AUTHOR1   S
1 An Introduction to Data Ethics MODULE AUTHOR1 SMerrileeDelvalle969
 
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [AlyciaGold776
 
Predicting user behavior using data profiling and hidden Markov model
Predicting user behavior using data profiling and hidden Markov modelPredicting user behavior using data profiling and hidden Markov model
Predicting user behavior using data profiling and hidden Markov modelIJECEIAES
 
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...IJCSES Journal
 
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...IJCSES Journal
 
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfTwin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfSreevalsan V.K.
 
Running head LITERATURE REVIEW .docx
Running head LITERATURE REVIEW                                   .docxRunning head LITERATURE REVIEW                                   .docx
Running head LITERATURE REVIEW .docxcharisellington63520
 
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...IJCI JOURNAL
 
APPLYING QUALITATIVE RESEARCH IN E-LEARNING DISCUSSION AND FINDINGS FROM THR...
APPLYING QUALITATIVE RESEARCH IN E-LEARNING  DISCUSSION AND FINDINGS FROM THR...APPLYING QUALITATIVE RESEARCH IN E-LEARNING  DISCUSSION AND FINDINGS FROM THR...
APPLYING QUALITATIVE RESEARCH IN E-LEARNING DISCUSSION AND FINDINGS FROM THR...Monica Waters
 
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docxRunning head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docxjenkinsmandie
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Turner Sparks
 

Similar to Issues in Information SystemsVolume XII, No. 2, pp. 67-73-.docx (20)

2008 Annual Review Presentation
2008 Annual Review Presentation2008 Annual Review Presentation
2008 Annual Review Presentation
 
Identifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysisIdentifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysis
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Science
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measurem
 
Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docx
 
1 An Introduction to Data Ethics MODULE AUTHOR1 S
1 An Introduction to Data Ethics MODULE AUTHOR1   S1 An Introduction to Data Ethics MODULE AUTHOR1   S
1 An Introduction to Data Ethics MODULE AUTHOR1 S
 
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
 
Predicting user behavior using data profiling and hidden Markov model
Predicting user behavior using data profiling and hidden Markov modelPredicting user behavior using data profiling and hidden Markov model
Predicting user behavior using data profiling and hidden Markov model
 
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
 
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
 
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfTwin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
 
Running head LITERATURE REVIEW .docx
Running head LITERATURE REVIEW                                   .docxRunning head LITERATURE REVIEW                                   .docx
Running head LITERATURE REVIEW .docx
 
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
 
APPLYING QUALITATIVE RESEARCH IN E-LEARNING DISCUSSION AND FINDINGS FROM THR...
APPLYING QUALITATIVE RESEARCH IN E-LEARNING  DISCUSSION AND FINDINGS FROM THR...APPLYING QUALITATIVE RESEARCH IN E-LEARNING  DISCUSSION AND FINDINGS FROM THR...
APPLYING QUALITATIVE RESEARCH IN E-LEARNING DISCUSSION AND FINDINGS FROM THR...
 
ppt1 - Copy (1).pptx
ppt1 - Copy (1).pptxppt1 - Copy (1).pptx
ppt1 - Copy (1).pptx
 
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docxRunning head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
 

More from vrickens

1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docxvrickens
 
1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docxvrickens
 
1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docxvrickens
 
10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docxvrickens
 
100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docxvrickens
 
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docxvrickens
 
1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docxvrickens
 
100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docxvrickens
 
100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docxvrickens
 
100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docxvrickens
 
100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docxvrickens
 
100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docxvrickens
 
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docxvrickens
 
100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docxvrickens
 
100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docxvrickens
 
100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docxvrickens
 
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docxvrickens
 
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docxvrickens
 
10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docxvrickens
 
10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docxvrickens
 

More from vrickens (20)

1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx
 
1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx
 
1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx
 
10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx
 
100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx
 
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
 
1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx
 
100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx
 
100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx
 
100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx
 
100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx
 
100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx
 
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
 
100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx
 
100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx
 
100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx
 
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
 
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
 
10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx
 
10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx
 

Recently uploaded

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 

Recently uploaded (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

Issues in Information SystemsVolume XII, No. 2, pp. 67-73-.docx

  • 1. Issues in Information Systems Volume XII, No. 2, pp. 67-73-, 2011 Information Technology Ethics: A Research Framework Issues in Information Systems Volume X, Issue X, pp. x-x, Year INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK Richard V. McCarthy, Quinnipiac University, [email protected] Leila Halawi, Nova Southeastern University, [email protected] Jay E. Aronson, The University of Georgia, [email protected] ABSTRACT Information technology has become so pervasive that opportunities for abuses abound. IT Ethics has taken on increasing importance as the size and complexity of IT issues continues to grow. This paper outlines a research framework to analyze: Do significant ethical differences exist amongst undergraduate and graduate MIS students? Keywords: Information Technology (IT), Ethics, IT and Ethics INTRODUCTION We live in an information society. Most people live and work within the context of information technology (Abratt, Nel, & Higgs, 1992). IT enhances leisure time and enriches culture by expanding the distribution of information, relieves pressures on urban areas by enabling individuals to work from home or
  • 2. remote-site offices (Garcia, 2009), changes the way we work, and the way we work with one another. In terms of productivity and speed of communications, these changes have been mostly positive (Benham, 1995). But what have been the costs? IT introduces change that creates new ethical issues. Ethical Theories and IT Gates (1995) suggested that the study of computer ethics is needed because there is a vacuum of policies surrounding the new possibilities. He defines computer ethics as the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such a technology. RESEARCH METHODOLOGY Our research centered upon the following research question: Do significant ethical differences exist amongst undergraduate and graduate MIS students in the United States? The research hypotheses to be tested are as follows: H1: Computer information systems undergraduate and graduate students have the same ethical beliefs H2: Female computer information systems students and male computer information systems students have the same ethical beliefs. To test these hypotheses a subset of five ethical scenarios that were utilized by Athey (2011) to test if significant ethical differences existed amongst manager was used along with one ethical scenario that was developed based upon an actual case from the researcher’s university. According to Jones (2014),
  • 3. “the scenario technique has been shown to be useful in eliciting attitudes by personalizing the issues” (p. 15). RESULTS Eighty-seven scenarios were administered and the demographics of the sample population are shown in Table 1. The sample population had more males (70.1%) than females (29.9%). A Chi-Square test was performed to test each of the three hypotheses. The first hypothesis tested whether undergraduate and graduate computer information systems students hold the same ethical beliefs. Responses from MBA students were not considered as part of this analysis. A p-value was calculated for each of the six scenarios and any value less than .05 was rejected. Scenarios 2 and 6 were rejected on this basis, but scenarios 1, 3, 4, and 5 were accepted. Table 1. Demographics Gender Program Responses Female Undergraduate CIS student 4 Graduate CIS student 6 Graduate MBA student 16 Male Undergraduate CIS student 27 Graduate CIS student 19
  • 4. Graduate MBA student 15 The second hypothesis tested whether female and male computer information systems students hold the same ethical beliefs. Responses from MBA students were not considered as part of this analysis. A p-value was calculated for each of the six scenarios and any value less than .05 was rejected. Scenarios 1, 2, 3 and 6 were rejected on this basis, but scenarios 4 and 5 were accepted. Figure 1. Technology Adoption Life Cycle The third hypothesis tested whether computer information systems graduate students and masters of business administration graduate students hold the same ethical beliefs. Responses from undergraduate students were not considered as part of this analysis. A p-value was calculated for each of the six scenarios and none of the scenarios exhibited a value less than .05. SUMMARY It was very clear from the responses that there were no significant differences in ethical beliefs amongst MBA and MS- CIS graduate students. It should be noted that in both cases the students had not received formal training related to computer ethics within there program of study, though in both cases the topic was covered in sections within their curriculum. The curriculum for the MBA students is changing next year to include a formal course in business ethics that will include information technology related topics. Based upon the results of our study, we concluded that significant differences existed between male and female computer information systems students in their ethical beliefs. Though as noted previously, there was a small sample population of female students. This is significant because it supports the industry study gender differences that show that
  • 5. software piracy and hacking tend to be more prevalent amongst males than females. REFERENCES Abratt, R., Nel D., & Higgs, S. N. (1992). An examination of the ethical beliefs of managers using selected scenarios in a cross-cultural environment. Journal of Business Ethics, 11(1), 29-35. Benham, H. C., & Wagner, J. L. (1995). Ethical attitudes of business students and MIS personnel. Proceedings of the ACM SIGCPR Conference [online], Nashville TN USA, 44-49. Available: www.acm.org/pubs/articles/proceedings/cpr/212490/p44- wagner/p44-wagner.pdf Gates, B. (1995). The road ahead. New York, NY: Viking Penguin Group. 0.00% 10.00% 20.00% 30.00% 40.00%